Privacy preservation using game theory in e-health application

被引:5
|
作者
Sfar, Arbia Riahi [1 ]
Natalizio, Enrico [2 ,3 ]
Mazlout, Sahbi [1 ]
Challal, Yacine [4 ]
Chtourou, Zied [1 ]
机构
[1] Mil Acad Tunisia, STD Lab, Nabeul, Tunisia
[2] Technol Innovat Inst TII, Abu Dhabi, U Arab Emirates
[3] Univ Lorraine, LORIA, CNRS, Nancy, France
[4] Ecole Natl Super Informat, Lab Methodes Concept Syst, Algiers, Algeria
关键词
Privacy; Internet of Things; E-health; Game theory; Markovian process;
D O I
10.1016/j.jisa.2022.103158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In new e-health applications, the ubiquitous nature of intelligent devices raises legitimate questions aboutpeoples' privacy, and how to cope with the heterogeneity of user and application requirements in termsof security services. This requires the development of adaptive, context-aware and user-centric securitysolutions. Recent e-health applications (M2M: Machine-to-Machine/IoT: Internet of Things/Web) permit remotemonitoring of patient health, medical treatments, fitness information and parameters, alarm triggering, etc. Asmonitored devices are tightly related to humans, they became able to act on their behalf, and may be modeledas attackers or defenders to make their decision autonomously. In this work, we propose a Markov basedTheory Game Model (MTGM) between a data holder and a data requester in e-health applications to protectdata privacy. The proposed solution ensures the highest payoff through the privacy-preserving decision takento reach a compromise between privacy concession and incentive motivation. Numerical results of executedexperiments are shown to confirm that game theory can enhance privacy protection and improve performanceregarding time efficiency and information loss.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Security Improvement and Privacy Preservation in E-Health
    Kishore, Pushkar
    Barisal, Swadhin Kumar
    Kumar, Kulamala Vinod
    Mohapatra, Durga Prasad
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [2] Privacy and e-health
    Biclet, Philippe
    [J]. MEDECINE & DROIT, 2013, (118): : 3 - 4
  • [3] Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities
    Kanwal, Tehsin
    Anjum, Adeel
    Khan, Abid
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (01): : 293 - 317
  • [4] Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities
    Tehsin Kanwal
    Adeel Anjum
    Abid Khan
    [J]. Cluster Computing, 2021, 24 : 293 - 317
  • [5] Enhancing Security and Privacy Preservation of Sensitive Information in e-Health Datasets Using FCA Approach
    Hamdi, Hedi
    Brahmi, Zaki
    Alaerjan, Alaa S. S.
    Mhamdi, Lotfi
    [J]. IEEE ACCESS, 2023, 11 : 62591 - 62604
  • [6] Preserving data privacy in e-health
    Conti, Riccardo
    Lunardelli, Alessio
    Matteucci, Ilaria
    Mori, Paolo
    Petrocchi, Marinella
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 366 - 392
  • [7] Preserving data privacy in e-Health
    [J]. 1600, Springer Verlag (8431):
  • [8] Virtually exposed: Privacy and e-health
    Goldman, J
    Hudson, Z
    [J]. HEALTH AFFAIRS, 2000, 19 (06) : 140 - 148
  • [9] Privacy management in consumer e-health
    Chowdhury, Arnab
    Ray, Pradeep
    [J]. HEALTHCOM 2007: UBIQUITOUS HEALTHCARE IN AGING SOCIETIES, 2007, : 29 - +
  • [10] Ensuring privacy for e-health services
    Yee, George
    Korba, Larry
    Song, Ronggong
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 321 - +